edge adaptive image steganography based on lsb matching revisited
#1
Question 

hi,this is kavitha im doing a project on edge adaptive image steganography based on lsb matching revisited,im having abstract and requirements ,i need source code for my project
ABSTRACT :

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions.[/u][/color]
In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and he difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The experimental results evaluated on 6000 natural images with three specific and four universal steganalytic algorithms show that the new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stage images at the same time.

Introduction

STEGANOGRAPHY is a technique for information hiding. It aims to embed secret data into a digital cover media, suchvas digital audio, image, video, etc., without being suspicious. steganalysis aims to expose the presence of hidden secret messages in those stego media.

the common approaches used to detect LSB replacement are totally ineffective at detecting the LSBM. 
Existing System:

Steganalytic algorithms, such as the RS analysis LSB replacement is a well-known steganographic method. In this embedding scheme, only the LSB plane of the cover image is overwritten with the secret bit stream according to a pseudorandom number generator (PRNG)

In this section, we first give a brief overview of the typical LSB-based approaches including LSB replacement, LSBM, and LSBMR, and some adaptive schemes including the original PVD scheme, the improved version of PVD (IPVD), adaptive edges with LSB (AE-LSB), and hiding behind corners (HBC) , and then show some image examples to expose the limitations of these existing schemes. Finally we propose some strategies to overcome these limitations.
Proposed system:

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain.

LSB matching (LSBM) employs a minor modification to LSB replacement. If the secret bit does not match the LSB of the cover image, then or is randomly added to the corresponding
pixel value. Statistically, the probability of increasing or decreasing for each modified pixel value is the same and so the obvious asymmetry artifacts introduced by LSB replacement
can be easily avoided
architecture :


In the LSB replacement and LSBM approaches, the embedding process is very similar. Given a secret bit stream to be embedded, a traveling order in the cover image is first generated by a PRNG, and then each pixel along the traveling order is dealt with separately. For LSB replacement, the secret bit simply overwrites the LSB of the pixel, i.e., the first bit plane, while the higher bit planes are preserved. For the LSBM scheme, if the secret bit is not equal to the LSB of the given pixel, then 1 is added randomly to the pixel while keeping the altered pixel in the range of . In such a way, the LSB of pixels along the traveling order will match the secret bit stream after data hiding both for LSB replacement and LSBM. 
System Configuration
Hardware requirements :
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 MB.
Software requirements:
• Operating system : Windows XP Professional.
• Coding Language : Java

Reply
#2
to get information about the topic Steganography In Images full report,ppt and related topic refer the page link bellow

http://studentbank.in/report-steganograp...ars-report

http://studentbank.in/report-steganograp...ort?page=3

http://studentbank.in/report-steganograp...ort?page=2

http://studentbank.in/report-visual-cryp...-in-images

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-image-steganography

http://studentbank.in/report-steganography-in-images

http://studentbank.in/report-an-overview...ganography

http://studentbank.in/report-steganography--10609

http://studentbank.in/report-edge-adapti...-revisited

http://studentbank.in/report-a-novel-tec...n-encoding

http://studentbank.in/report-image-stega...-transform
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography lsb ppt, lsbm algorithm in edge adaptive image steganography, lsb matching revisited source code in c sharp, advantages of adaptive pixel pair matching ppt, random lsb steganography, seminar report on lsb steganography, new approach in steganography by integrating different lsb algorithms and applying ra,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Sad OCR for image files tawfiq1200 0 1,046 21-09-2014, 10:35 PM
Last Post: tawfiq1200
  edge adptive image steganography based on lsb matching revisited 1 1,162 29-11-2012, 01:57 PM
Last Post: seminar details
Wink edge technology sneha saraswati 3 2,093 12-10-2012, 12:29 PM
Last Post: seminar details
Thumbs Up source code for image restoration,reconstruction and enchancement srividyajv20 1 3,841 20-05-2012, 04:44 PM
Last Post: Guest
  advantages of edge detection 1 961 07-03-2012, 09:16 AM
Last Post: seminar paper
  landmine detection using wireless robot conttroled using image processing shyam langote 1 1,728 06-03-2012, 08:12 PM
Last Post: Guest
  adaptive photonic based phase locked elements technology ppt & documentation 0 1,131 04-03-2012, 03:15 PM
Last Post: Guest
  DISTORTION MINIMIZATION AND SECURED STEGANOGRAPHY USING CRYPTOGRAPHY KAVITHA MANIAN 0 867 26-02-2012, 07:17 PM
Last Post: KAVITHA MANIAN
Wink ppt on Supporting Pattern Matching Queries over Trajectories on Road Networks 0 892 18-02-2012, 09:05 PM
Last Post: Guest
Smile image processing shriramngn 1 1,140 10-02-2012, 10:40 AM
Last Post: seminar addict

Forum Jump: